Wireless EventWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Wireless Event returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Mobile Device Management
 •   Network Security
 •   Wireless Security
 •   Security Monitoring
 •   Security Policies
 •   Event Automation
 •   Endpoint Security
 •   Application Security

Related Searches
 •   Canadian Wireless Event
 •   Content Wireless Event
 •   Faqs Wireless Event
 •   Simple Wireless Event
 •   Wireless Event Example
 •   Wireless Event Global
 •   Wireless Event Intrastructures
 •   Wireless Event Open
 •   Wireless Event Usa
 •   Wireless Event White Paper
Advertisement

ALL RESULTS
1 - 25 of 452 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Linear Architecture for Municipal Wireless Video Surveillance Solutions by Motorola, Inc.

August 20, 2009 - (Free Research)
Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed. 
(WHITE PAPER) READ ABSTRACT |

Mobility on Cisco Catalyst Series Switches - The Wired Side of Wireless by Cisco Systems, Inc.

July 01, 2008 - (Free Research)
Cisco has defined a wireless architecture that provides tight integration and unification of wired and wireless networks. Read this paper to learn about the key features and business benefits of Cisco Catalyst Series switches and Cisco Unified Wireless Networks. 
(DATA SHEET) READ ABSTRACT |

Virtual Event: Power to Change - What's changing about ALM? by Hewlett-Packard Company

September 10, 2013 - (Free Research)
Register to attend the free Power to Change online virtual event sponsored by HP to hear industry visionaries, analysts, and practitioners discuss how change is affecting various aspects of application lifecycle management (ALM.) 
(EVENT) READ ABSTRACT |

Mobile location-based services gaining ground by ComputerWeekly.com

November 24, 2010 - (Free Research)
From the turn of the millennium until the end of 2007 MLBS (Mobile Location Based Services) had promised much, but delivered very little in terms of commercial applications. Even in Japan and South Korea, the most advanced markets for commercial MLBS, usage was disappointing. 
(WHITE PAPER) READ ABSTRACT |

Video Surveillance Economics: The New Picture of Quality and Economy by Motorola, Inc.

August 21, 2009 - (Free Research)
As the world becomes increasingly security conscious, municipalities, institutions and enterprises of all sizes are discovering that there's safety in sight. Real-time video surveillance systems are proving to be one of the most effective methods of addressing a wide range of security challenges in both the public and the private sectors. 
(WHITE PAPER) READ ABSTRACT |

Successfully Mitigating Corporate Risk by AT&T Corp

April 05, 2010 - (Free Research)
This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment. 
(WHITE PAPER)

Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones by BlackBerry

September 16, 2011 - (Free Research)
Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption. 
(CASE STUDY) READ ABSTRACT |

HP Power to Change: Embracing the new style of IT by Hewlett-Packard Company

September 10, 2013 - (Free Research)
Do things you never thought possible and register now to join the HP Power to Change virtual event – starting September 10, 2013 at 9 am PT and October 1, 2013 at 9 am BST – to harness IT change and take it to new heights. 
(EVENT) READ ABSTRACT |

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension

September 25, 2012 - (Free Research)
Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Case Study: Banca Intesa Counters Threats with HP ArcSight by Hewlett-Packard Limited

March 29, 2013 - (Free Research)
Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure. 
(CASE STUDY) READ ABSTRACT |

Dell ProSupport Laptop Tracking and Recovery by Dell, Inc.

January 09, 2009 - (Free Research)
The Dell ProSupport Laptop Tracking and Recovery Service helps protect your data by enabling you to track your mobile systems in the event a system is lost or stolen. 
(DATA SHEET) READ ABSTRACT |

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

HP Total Care Branch Office Consolidation Solutions by HP & Intel®

July 2009 - (Free Research)
If branch office consolidation is your goal, HP has developed solutions with a focus on lowering your Total Cost of Ownership (TCO) and boosting productivity for both branch office employees and IT staff. Read this paper for more details. 
(WHITE PAPER)

Blackberry Solution Increases Customer Service for Corporate Real Estate Company by BlackBerry

February 2009 - (Free Research)
J.J. Barnicke's sales people needed instant access to corporate property information to better serve clients and speed up sales cycles. They also needed wireless access to CRM data This case study explains how J.J. Barnicke is using BlackBerry and the sales force solution to access CRM information about clients. 
(CASE STUDY) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Power and Cooling Network Closets in the Healthcare Setting by Emerson Network Power

October 2010 - (Free Research)
Network closets in the healthcare setting are housing more powerful and critical equipment as hospitals and ambulatory offices rely on these spaces to support an increasing number of business-critical applications such as electronic medical records (EMRs), wireless communications and digital imaging. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Deploying the Best SIEM System Available by Hewlett-Packard Limited

April 2013 - (Free Research)
Uncover the SIEM a security service provider uses to help them achieve real-time visibility and control over their systems and services to increase intelligence, protection, and safety. 
(CASE STUDY) READ ABSTRACT |

Top 10 Considerations for a Secure Mobile Enterprise. by Juniper Networks, Inc.

May 2012 - (Free Research)
This essential white paper explores ten rules every organization must follow to ensure the security of mobile devices in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Security Predictions for 2012 by Websense, Inc.

November 2011 - (Free Research)
With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events. 
(WHITE PAPER) READ ABSTRACT |

RSA Security Information and Event Management (SIEM) Deployment Guide by RSA, The Security Division of EMC

December 2010 - (Free Research)
The Cisco Smart Business Architecture for Enterprise offers partners and customers valuable network design and deployment best practices; helping organizations deliver superior end-user experiences that include switching, routing, security, and wireless technologies combined with the comprehensive management capabilities for the entire system. 
(WHITE PAPER) READ ABSTRACT |

VMware Enlisted to Serve Marine Corps Enterprise Networking Requirements by VMware, Inc.

December 2008 - (Free Research)
The MCNOSC needed an affordable and easy-to-manage alternate site with real-time data transfer that would be reliable in the event of a catastrophe so they implemented VMware virtual infrastructure which effectively met their requirements. 
(CASE STUDY) READ ABSTRACT |

CW500: The technology behind the BBC's Olympics coverage (video version) by ComputerWeekly.com

July 2012 - (Free Research)
John Linwood Chief Technology Office at the BBC explains the "terrifying" challenge of providing live coverage of all events at the Olympics, in this presentation for Computer Weekly's 500 Club. 
(PRESENTATION) READ ABSTRACT |

The Ten "Must Haves" for Secure Mobile Device Management by Zenprise

December 2011 - (Free Research)
Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report by Symantec Corporation

April 2013 - (Free Research)
This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

The Impact of Carrier Ethernet on Service Providers by Dorado Software

September 2009 - (Free Research)
Mobile internet access and the explosive demand for high bandwidth services on mobile devices have created a pivotal point for service providers. Those providers that can meet the new demands while increasing efficiency will be able to increase their market share, while those that are not will lose ground. Read on to learn how to keep up. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 452 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts